• 제목/요약/키워드: detection theory

검색결과 507건 처리시간 0.027초

Bayes 판단 이론 기반 멀티미디어 워터마크 검출 알고리즘 (Multimedia Watermark Detection Algorithm Based on Bayes Decision Theory)

  • 권성근;이석환;김병주;권기구;하인성;권기룡;이건일
    • 한국통신학회논문지
    • /
    • 제27권7A호
    • /
    • pp.695-704
    • /
    • 2002
  • 멀티미디어에 삽입된 워터마크의 검출은 저작권 보호 및 인증 분야에서 매우 중요한 역할을 한다. 최근 워터마크의 검출에 많이 사용되는 유사도 기반 알고리즘은 대상 영상의 분포 특성을 이용하지 않기 때문에 검출 성능이 떨어지는 단점을 가진다. 따라서 본 논문에서는 웨이블릿 변환 영역에서 상승적 방법에 의하여 삽입된 워터마크에 대한 효율적인 검출 알고리즘을 제안하였다. 제안한 워터마크 검출 알고리즘은 통계적 판단 이론에 따라 Bayes 판단 이론, 웨이블릿 계수들의 확률 분포 모델, 및 Neyman-Pearson 정의에 기반을 둔다. 따라서 제안한 검출 알고리즘에서는 주어진 오류 검출 확률에 대하여 간과 검출 확률을 최소화할 수 있는 장점이 있다. 제안한 검출 알고리즘의 성능 평가는 견고성 측면에서 수행되었고, 실험 결과로부터 제안한 알고리즘이 유사도 기반 알고리즘에 비하여 우수한 성능을 나타냄을 확인하였다.

Multimedia Watermark Detection Algorithm Based on Bayes Decision Theorys

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Kwon, Kee-Koo;Kwon, Ki-Ryong;Lee, Kuhn-Il
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.1272-1275
    • /
    • 2002
  • Watermark detection plays a crucial role in multimedia copyright protection and has traditionally been tackled using correlation-based algorithms. However, correlation-based detection is not actually the best choice, as it does not utilize the distributional characteristics of the image being marked. Accordingly, an efficient watermark detection scheme for DWT coefficients is proposed as optimal for non-additive schemes. Based on the statistical decision theory, the proposed method is derived according to Bayes' decision theory, the Neyman-Pearson criterion, and the distribution of the DWT coefficients, thereby minimizing the missed detection probability subject to a given false alarm probability. The proposed method was tested in the context of robustness, and the results confirmed the superiority of the proposed technique over conventional correlation-based detection method.

  • PDF

Dempster-Shafer's Evidence Theory-based Edge Detection

  • Seo, Suk-Tae;Sivakumar, Krishnamoorthy;Kwon, Soon-Hak
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제11권1호
    • /
    • pp.19-24
    • /
    • 2011
  • Edges represent significant boundary information between objects or classes. Various methods, which are based on differential operation, such as Sobel, Prewitt, Roberts, Canny, and etc. have been proposed and widely used. The methods are based on a linear convolution of mask with pre-assigned coefficients. In this paper, we propose an edge detection method based on Dempster-Shafer's evidence theory to evaluate edgeness of the given pixel. The effectiveness of the proposed method is shown through experimental results on several test images and compared with conventional methods.

신호탐지론을 활용한 조종사 Error 차이 분석 (Analysis of the Difference in Pilot Error by Using the Signal Detection Theory)

  • 권오영
    • 한국항공운항학회지
    • /
    • 제18권1호
    • /
    • pp.51-57
    • /
    • 2010
  • This study was to analyze the difference in pilot error by using the Signal Detection Theory. The task was to detect the targeted aircraft(signal) which is different shape from many other aircraft(noise). From the two experiments, we differentiated the task difficulty followed by change in noise stimuli. Experiment 1 was to search the signal stimuli(fighter plane) while the noise stimuli(cargo plane) were increasing. The results from the Experiment 1 showed the tendency to decrease the hit rate by increasing the number of noise stimuli. However, the false alarm rate was not increased. The sensitivity(d') showed quite high. In Experiment 2, a disturbance stimulus(helicopter) was added to noise stimuli. The result was generally similar to those of Experiment 1. However, the hit rate was lower than that of Experiment 1.

Game Theoretic Modeling for Mobile Malicious Node Detection Problem in Static Wireless Sensor Networks

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.238-242
    • /
    • 2021
  • Game theory has been regarded as a useful theoretical tool for modeling the interactions between distinct entities and thus it has been harnessed in various research field. In particular, research attention has been shown to how to apply game theory to modeling the interactions between malign and benign entities in the field of wireless networks. Although various game theoretic modeling work have been proposed in the field of wireless networks, our proposed work is disparate to the existing work in the sense that we focus on mobile malign node detection problem in static wireless sensor networks. More specifically, we propose a Bayesian game theoretic modeling for mobile malign node detection problem in static wireless sensor networks. In our modeling, we formulate a two-player static Bayesian game with imperfect information such that player 1 is aware of the type of player 2, but player 2 is not aware of the type of player 1. We use four strategies in our static Bayesian game. We obtain Bayesian Nash Equilibria with pure strategies under certain conditions.

Rough Set Theory와 Support Vector Machine 알고리즘을 이용한 RSIDS 설계 (A Design of RSIDS using Rough Set Theory and Support Vector Machine Algorithm)

  • 이병관;정은희
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권12호
    • /
    • pp.179-185
    • /
    • 2012
  • 본 논문에서는 RST(Rough Set Theory)과 SVM(Support Vector Machine) 알고리즘을 이용한 RSIDS (RST and SVM based Intrusion Detection System)를 설계하였다. RSIDS는 PrePro(Preprocessing) 모듈, RRG(RST based Rule Generation) 모듈, 그리고 SAD(SVM based Attack Detection) 모듈로 구성된다. PrePro 모듈은 수집한 정보를 RSIDS의 데이터 형식에 맞게 변경한다. RRG 모듈은 공격 자료를 분석하여 공격 규칙을 생성하고, 그 규칙을 이용하여 대량화된 데이터에서 공격정보를 추출하고, 그리고 추출한 공격정보를 SAD 모듈에 전달한다. SAD 모듈은 추출된 공격 정보를 이용하여 공격을 탐지하여 관리자에게 통보한다. 그 결과, 기존의 SVM과 비교해볼 때, RSIDS는 평균 공격 탐지율 77.71%에서 85.28%로 향상되었으며, 평균 FPR은 13.25%에서 9.87%로 감소하였다. 따라서 RSIDS는 기존의 SVM을 이용한 공격 탐지 기법보다 향상되었다고 할 수 있다.

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

다중 센서 항법 시스템에서의 센서 측정 실패 감지 시스템에 관한 연구 (Failure Detection of Multi-Sensor Navigation System)

  • 오재석;이판묵;오준호
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1997년도 춘계학술대회 논문집
    • /
    • pp.51-55
    • /
    • 1997
  • This study is devote to developing navigation filter for detecting sensor failure in multi-sensor navigation system. In multi-sensor navigation system, Kalman filter is generally used to fuse data of each sensors. Sensor failure is fatal in case that the sensor is used as external measurement of Kalman filter therefore detection and recovery of sensor failure is one the important feature of navigation filter. Generally each sensors have its specific feature in measuring navigational information. Fuzzy theory is proposed to detect external sensor failure and provide valid external measurement to Kalman filter avoiding filter divergence and instability. This idea is applied to Autonomous Underwater Vehicle(AUV) which has two navigation sensor i. e self contained inertial sensor and acoustic external sensor. 2 dimensional simulation result shows acceptable failure detection and recovery

  • PDF

웨이블릿 영역에서 통계적 판정법을 이용한 고신뢰 워터마크 검출 알고리즘 (Highly Reliable Watermark Detection Algorithm using Statistical Decision Method in Wavelet Domain)

  • 권성근;김병주;이석환;권기구;김영춘;권기룡;이건일
    • 한국멀티미디어학회논문지
    • /
    • 제6권1호
    • /
    • pp.67-77
    • /
    • 2003
  • 멀티미디어에 삽입된 워터마크의 검출은 저작권 보호 및 인증 분야에서 매우 중요한 역할을 한다. 최근 워터마크의 검출에 많이 사용되는 유사도 기반 알고리즘은 대상 영상의 분포 특성을 이용하지 않기 때문에 검출 성능이 떨어지는 단점을 가진다. 따라서 본 논문에서는 웨이블릿 변환 영역에서 효율적인 워터마크 검출 알고리즘을 제안하였다. 제안한 워터마크 검출 알고리즘은 통계적 판정법에 근거하여 Bayes판정 이론, Neyman-Pearson 정리, 및 웨이블릿 계수들의 분포 모델을 이용한다. 따라서 제안한 검출 알고리즘에서는 주어진 오류 검출 확률에 대하여 간과 검출 확률을 최소화할 수 있는 장점이 있다. 제안한 검출 알고리즘의 성능 평가는 견고성 측면에서 수행되었고, 실험 결과로부터 제안한 알고리즘이 유사도 기반 알고리즘에 비하여 우수한 성능을 나타냄을 확인하였다.

  • PDF

Eccentricity를 이용한 차선 검출에 관한 연구 (A Study on a Lane Detection Using Eccentricity)

  • 정태일;나심 아샤드;문광석;김종남
    • 한국정보통신학회논문지
    • /
    • 제16권12호
    • /
    • pp.2755-2761
    • /
    • 2012
  • 본 논문에서는 Eccentricity를 이용한 차선 검출 알고리듬을 제안한다. 차선 검출 알고리듬은 자동차 운전자의 안정성을 증가시키는 차선 이탈 경보 시스템 등에 활용될 수 있다. 차선 검출율을 개선하기 위하여 그래프 이론에서 소개되는 Eccentricity를 정의하고, 이를 차선 검출 알고리듬에 이용하여 Eccentricity를 계산하였다. 직선도로인 경우 Eccentricity는 1이고 1차 함수로 구현이 가능하다. 그래서 시간 복잡도와 공간 복잡도를 개선하였고, 아울러 기존의 방법들보다 차선 검출율이 향상됨을 확인하였다.